02-18-2016 07:14 AM - edited 03-05-2019 03:22 AM
I have setup traffic shaping to limit the internet bandwidth on 3 vlans (subnets), it is working but it is also limiting these 3 Vlans LAN bandwidth,
like, i setup 10Mbps internet limit which is working fine, it is also limiting 1G Lan bandwidth to 10Mbps. Please help.
following is my config.
class-map match-all Bandwidth
match access-group name Internet-Bandwidth
policy-map Upload
class Bandwidth
police 10000000 conform-action transmit exceed-action drop
policy-map Download
class Bandwidth
shape average 10000000
interface GigabitEthernet0/0.7
description Voice-Vlan
encapsulation dot1Q 7
ip address 192.168.7.3 255.255.255.0
service-policy output Download
interface GigabitEthernet0/0.8
description IT-Vlan
encapsulation dot1Q 8
ip address 192.168.8.3 255.255.255.0
service-policy output Download
interface GigabitEthernet0/0.9
description Reg-Vlan
encapsulation dot1Q 9
ip address 192.168.9.3 255.255.255.0
service-policy output Download
ip access-list extended Internet-Bandwidth
permit ip 192.168.7.0 0.0.0.255 any
permit ip 192.168.8.0 0.0.0.255 any
permit ip 192.168.9.0 0.0.0.255 any
permit ip any 192.168.7.0 0.0.0.255
permit ip any 192.168.8.0 0.0.0.255
permit ip any 192.168.9.0 0.0.0.255
02-18-2016 11:02 AM
Rather than applying it on the ingress VLANs, apply it on the egress VLAN pointing towards the Internet.
Otherwise change the access list to deny shaping for traffic heading towards your private IP addresses.
ip access-list extended Internet-Bandwidth
deny ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip 192.168.7.0 0.0.0.255 any
permit ip 192.168.8.0 0.0.0.255 any
permit ip 192.168.9.0 0.0.0.255 any
permit ip any 192.168.7.0 0.0.0.255
permit ip any 192.168.8.0 0.0.0.255
permit ip any 192.168.9.0 0.0.0.255
02-18-2016 11:04 AM
In fact you could probably simplify the access list down to (which means shape everything not going to and from an internal IP address):
ip access-list extended Internet-Bandwidth
deny ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip any any
02-18-2016 11:48 AM
Thanks Giuseppe and Philip, your both suggestion worked, but i analyzed that when i apply shaping on sub-internet-face (int gig 0/0.8) and i try to copy some data from other vlan server, my Lan speed downgrades, like a 1.15GB file copies around 360Mbps to 390Mbps with shaping. if i remove it from sub-internet-face (int gig 0/0.8) same file copies 700Mbps to 750Mpbs. i think shaping is till effecting Lan bandwidth.....
02-18-2016 11:52 AM
What platform is this being done on?
02-18-2016 11:55 AM
Cisco IOS Software, 3800 Software (C3845-ADVENTERPRISEK9-M), Version 15.1(4)M8, RELEASE SOFTWARE (fc2)
02-18-2016 11:57 AM
Hmm. I suspect we might be maxing out the CPU. When you do the file copy does the CPU on the router hit 100%? What does it get up to?
Have you got CEF enabled?
02-18-2016 12:06 PM
Yes Router CPU goes to 100%, i see "ip cef" in my running config.
02-18-2016 12:08 PM
The short answer is your platform does not have enough grunt to do PBR at these speeds.
You should do PBR on the circuit heading towards the Internet instead. If you don't have such a layer 3 interface then you may need to create one.
02-18-2016 12:30 PM
actually my main goal is to restrict the internal user to 10Mbps link, and setup VOIP QoS with remote office over the VPN. i have setup PBR. following is my config.
track 10 ip sla 1 reachability
delay down 1 up 1
!
track 20 ip sla 2 reachability
delay down 1 up 1
interface GigabitEthernet0/0.10
description Servers-&-Switches-Vlan
encapsulation dot1Q 10
ip address 192.168.10.3 255.255.255.0
no ip proxy-arp
ip nat inside
ip virtual-reassembly in
ip policy route-map PBR
interface FastEthernet0/0/1
description "Fiber Link 30Mbps"
ip address 50.x.x.x 255.255.255.248
ip nat outside
ip virtual-reassembly in
duplex auto
speed 100
interface FastEthernet0/1/0
description "Cable Link 12Mbps"
ip address 162.x.x.x 255.255.255.224
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
ip nat inside source route-map ISP1 interface FastEthernet0/0/1 overload
ip nat inside source route-map ISP2 interface FastEthernet0/1/0 overload
ip access-list extended acl_internet
deny ip 192.168.0.0 0.0.255.255 10.10.10.0 0.0.0.255
deny ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip 192.168.0.0 0.0.255.255 any
ip access-list extended acl_natisp1
deny ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip 192.168.0.0 0.0.255.255 any
ip access-list extended acl_natisp2
deny ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip 192.168.0.0 0.0.255.255 any
ip sla 1
icmp-echo 50.x.x.x
threshold 500
timeout 500
frequency 1
ip sla schedule 1 life forever start-time now
ip sla 2
icmp-echo 162.x.x.x
threshold 500
timeout 500
frequency 1
ip sla schedule 2 life forever start-time now
route-map PBR permit 10
match ip address acl_natisp1
set ip next-hop verify-availability 50.x.x.x 1 track 10
!
route-map PBR permit 20
match ip address acl_natisp2
set ip next-hop verify-availability 162.x.x.x 2 track 20
!
route-map ISP2 permit 20
match ip address acl_internet
match interface FastEthernet0/1/0
!
route-map ISP1 permit 10
match ip address acl_internet
match interface FastEthernet0/0/1
02-18-2016 01:08 PM
If you actually have a Gigabit Internet circuit then the hardware you have is not going to do meet your new requirements.
Ideally you want a layer 3 switch to route between the internal VLANs. This can do it at line rate.
Then use something like a Cisco 4451 to do the Internet circuit and PBR. You'll want the HSEC and probably the AppX licence as well.
02-18-2016 01:16 PM
i have Fastethernet for Internet and Gigabit for Intranet (Vlans) on router. I have WS-3560G as core switch, can i do shaping on core switch and VOIP QoS on router?
02-18-2016 01:18 PM
This should make it easy. Do all the routing for the VLANs on the 3560. Don't do it on the router.
Use the router only for the Internet circuit, and do the shaping on the port to the Internet.
02-18-2016 01:37 PM
hmm, i have to think about it, it is critical production environment. any suggestion how to move Vlans from router to switch? and any recommended stackable switch to replace 3560.
i wanted to update you, if i remove shaping and copy data from other vlan then router CPU goes to 90%. it is normal? or there is something wrong with IOS?
02-18-2016 03:04 PM
Cisco 3850's are great stackable switches.
The current 3845 you are using is struggling to keep up with the laod you are already giving it. Yes I could believe it running at 90% CPU load based on what you have said.
The design isn't correct. The VLANs should really be routed on a L3 switch, not the router.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide